A virtual Chief Information Security Officer (or vCISO) can be a great resource to a company. But how do you know when your company is ready for one? Rob Black of Fractional CISO shares four telltale signs to watch for.
A proposed right to repair law in New Hampshire won’t make the Internet of Things one iota less secure. It will benefit consumers and the planet by extending the useful life of a wide range of connected devices, while making it easier to keep them secure throughout their useful life.
Like leather upholstery for your new car, add-ons to your threat intelligence service are hard to resist. But Chris Camacho of Flashpoint* says “buyer beware:” threat intel add-ons may be more trouble than they’re worth. If you’ve ever shopped for a new car, you’re likely familiar with the dizzying number of add-on features available—from custom paint jobs to built-in navigation systems. These features are enticing for an obvious reason: they enable you to customize your car to your preferences, and often at a reasonable price point. Add-ons exist for more than just cars, of course. They’re increasingly available in the threat intelligence market, particularly with respect to datasets. Deep & Dark Web (DDW) data add-ons have grown especially prevalent in recent years, but as with any security-oriented product or service, these offerings aren’t suitable for everyone. Here are some key factors to consider before purchasing a DDW data add-on for your […]